Interpretable Encrypted Searchable Neural Networks

  • Kai Chen
  • Zhongrui Lin
  • Jian Wan
  • Chungen XuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11806)


In cloud security, traditional searchable encryption (SE) requires high computation and communication overhead for dynamic search and update. The clever combination of machine learning (ML) and SE may be a new way to solve this problem. This paper proposes interpretable encrypted searchable neural networks (IESNN) to explore probabilistic query, balanced index tree construction and automatic weight update in an encrypted cloud environment. In IESNN, probabilistic learning is used to obtain search ranking for searchable index, and probabilistic query is performed based on ciphertext index, which reduces the computational complexity of query significantly. Compared to traditional SE, it is proposed that adversarial learning and automatic weight update in response to user’s timely query of the latest data set without expensive communication overhead. The proposed IESNN performs better than the previous works, bringing the query complexity closer to \(O(\log N)\) and introducing low overhead on computation and communication.


Searchable encryption Searchable neural networks Probabilistic learning Adversarial learning Automatic weight update 



This work was supported by “the Fundamental Research Funds for the Central Universities” (No. 30918012204) and “the National Undergraduate Training Program for Innovation and Entrepreneurship” (Item number: 201810288061). NJUST graduate Scientific Research Training of ‘Hundred, Thousand and Ten Thousand’ Project “Research on Intelligent Searchable Encryption Technology”.


  1. 1.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  2. 2.
    Goodfellow, I.J., et al.: Generative adversarial networks. CoRR abs/1406.2661 (2014)Google Scholar
  3. 3.
    Guo, Z., Zhang, H., Sun, C., Wen, Q., Li, W.: Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137(3), 380–395 (2018)CrossRefGoogle Scholar
  4. 4.
    Hinton, G.E., Osindero, S., Welling, M., Teh, Y.W.: Unsupervised discovery of nonlinear structure using contrastive backpropagation. Cogn. Sci. 30(4), 725–731 (2006)CrossRefGoogle Scholar
  5. 5.
    Kumar, D.V.N.S., Thilagam, P.S.: Approaches and challenges of privacy preserving search over encrypted data. Inf. Syst. 81, 63–81 (2019)CrossRefGoogle Scholar
  6. 6.
    Li, R., Xu, Z., Kang, W., Yow, K., Xu, C.: Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener. Comp. Syst. 30(1), 179–190 (2014)CrossRefGoogle Scholar
  7. 7.
    Park, J.H., Kim, Y.S., Eom, I.K., Lee, K.Y.: Economic load dispatch for piecewise quadratic cost function using hopfield neural network. IEEE Trans. Power Syst. 8(3), 1030–1038 (1993)CrossRefGoogle Scholar
  8. 8.
    Song, D.X., Wagner, D.A., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S & P 2000, pp. 44–55. IEEE Computer Society (2000)Google Scholar
  9. 9.
    Sun, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)CrossRefGoogle Scholar
  10. 10.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM 2010, pp. 525–533 (2010)Google Scholar
  11. 11.
    Witten, I.H., Moffat, A., Bell, T.C.: Managing Gigabytes: Compressing and Indexing Documents and Images, 2nd edn. Morgan Kaufmann, Burlington (1999)zbMATHGoogle Scholar
  12. 12.
    Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: ACM SIGMOD 2009, pp. 139–152. ACM (2009)Google Scholar
  13. 13.
    Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRefGoogle Scholar
  14. 14.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM 2010, pp. 534–542. IEEE (2010)Google Scholar
  15. 15.
    Zhang, H., Goodfellow, I.J., Metaxas, D.N., Odena, A.: Self-attention generative adversarial networks. In: ICML 2019, pp. 7354–7363. PMLR (2019)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ScienceNanjing University of Science and TechnologyNanjingChina
  2. 2.School of Computer Science and EngineeringNJUSTNanjingChina

Personalised recommendations